CISCO Cyberops Associate 5 - Network security and forensic analysis
NIST SP 800-86 concepts
- National Institute of Standards and Technology, Special Publications 800 Series.
Evidence collection order
- Volatile data collection (can be lost when pulling the cable of the computer).
- Data integrity (on ackups and imaging).
- Data preservarion.
graph LR; A[Media]; B[Data]; C[Information]; D[Evidence]; E[Report]; A -- collection --> B; B -- examination --> C; C -- analysis --> D; D -- reporting --> E; D --> A;
Security management concepts
- Security policies: document that spells out the rules, expectations, and approachto maintain the confidentiality, integrity, and availability of data.
- Asset management:
- Every sigle asset should be accounted for.
- Asset in compliance.
- Response when out of compliance.
- Configuration management:
- Discovery.
- Configuration baseline (detect configuration drifts).
- Assess, alert, report.
- Remediate.
- Rely on automation.
- Mobile device management:
- Software tool for smartphones, laptops, tablets, IoT devices.
- Manage, productivity and compliance.
- Patch management:
- Starts with aasset management.
- Identify, adquire, install and verify patches.
- Correct security flaws and mitigate vulnerabilities.
- Must not neglect.
- Balance, usability and availability.
- Vulnerability management.
- Discover (identify).
- Prioritize (handle list).
- Assess (only mitigation, or remdiation).
- Remediate.
- Verify.
- Report.
- Asset management:
SOC metrics and scope analysis
- People in the SOC (escalation model):
- Tier 1: alert analyst (front line response):
- Monitoring incidents.
- Open tickets.
- Basic threat mitigation.
- Tier 2: incident responder (review for indicator, try some remediation):
- Deep investigation.
- Advice.
- Recommend action.
- Tier 3: subject matter expert (SME) or Hunter:
- Knowledge.
- Hunt trheats.
- Prevention (pass this info back to Tier 1 and Tier 2).
- Tier 1: alert analyst (front line response):
- Goal SOC metrics:
- Criteria:
- Speed.
- Focus.
- Accuracy.
- Goals:
- Understand identify risks.
- Meassure effectiveness.
- Optimize resources.
- Investment allocation.
- Metrics:
- Time to detect (MTTD).
- Time to response (MTTR).
- Time to control.
- Time to contain.
- Criteria:
Protected data in a network
- Personal, privacy and protected:
- PII (Person Identifiable Information): it can lead back to real person.
- PSI (Privacy Sensitive Information): “you choose what information you want to reveal”.
- PHI (Protected Health information): can lead to discrimination.
- Intellectual property (“creation of the mind”):
- Inventions.
- Literary and artistic works.
- Symbols, names, images.
- Designs used in commerce.
Network and server profiling elements
Set baseline, and heck things out of the norm.
- Network profiling:
- Total throughput (e.g. saturation = DDoS).
- Session duration (e.g. connection during off-hours).
- Ports used (e.g. ports allowed).
- Critical assets address space (e.g. having server ranges, if you notice a client on one of those ranges, it is abnormal).
- Server profiling:
- Listening ports.
- Logged in users, service accounts.
- Running processes.
- Running tasks.
- Profiling tools:
- Baselines.
- Policies (e.g. asset, configuration, vulnerability).
- Wireshark, nmap, netstat.
- Logs.
Integrate forensic elements into incident analysis
- NIST SP-800-61 Revision 2.
Incidents:
- Data breach.
- Provacy breach.
- Physical breach.
- Missing assets.
Steps of incident handing (by coordination and incident-reponse teams flow):
graph LR; A[fa:fa-shield Preparation]; B[fa:fa-magnifying-glass Detection, analysis]; C[fa:fa-truck-medical Containment, eradication, recovery]; D[fa:fa-road Post-indicent activity]; A --> B; B --> C; C --> B; C --> D; D --> A;
- Preparation:
- “Readiness”.
- Communication and facilities.
- Hadrware and software.
- Documentation.
- Images.
- Detection and analysis:
- Determine incident ocurred.
- Prioritize handling.
- Report incident to stakeholders.
- Containment, eradication, recovery:
- Limits damage.
- Acquire and preserve evidence.
- Eradicate.
- Recovery.
- Post-incident analysis:
- Lessons learned.
- Learn to improve.
- Report.
- Preparation:
Sharing information with other parties
graph LR; A[Incident response team]; B[Other ncident response team]; C[Internet reporters]; D[Internet service providers]; E[Customers, Constituents and media]; F[InteSoftware and support vendores]; G[Law enforcement agencies] A --> B; A --> C; A --> D; A --> E; A --> F; A --> G;
Elements of an IRP
- Incident reponse plan (IRP) according to NIST SP-800-61 Revision 2 (with National Footbal League analogy):
- Leadership (head coach):
- Mission.
- Strategies and goals.
- Senior management approval.
- Organizational approach (ofensive and defensive coordinators):
- Organizational approach to incident response.
- Resource mobilitazion (special teams coach):
- How the incident response team will communicate with the rest of the organization and with other organizations.
- Metrics for measuring the incident response capability and its effectiveness.
- Incident reponse plan (playbook):
- Roadmap for maturing the incident response capability.
- How the program fits into the overall organization.
- Leadership (head coach):